Unlock instant, AI-driven research and patent intelligence for your innovation.

Cipher processor for avoiding reciphering and method for accessing data using same

A technology for accessing data and processors, applied in the fields of digital data protection, electrical digital data processing, instruments, etc., it can solve the problems of the system not working properly, the timing of re-encryption is different, and the data is insecure, so as to avoid re-encryption operations. , improve performance, avoid the effect of password manipulation

Active Publication Date: 2009-02-04
HUAZHONG UNIV OF SCI & TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the number of users revoked at a certain time is quite large, the overhead of re-encryption may cause the system to not work properly
(2) Delayed re-encryption, that is, the file is re-encrypted only when the file is updated next time. Before the update, the keys of all files that the revoked user has access to may have been exposed to the attacker, resulting in data insecurity
(3) Timing re-encryption, this scheme is similar to scheme (2), and the overhead of re-encryption may also cause the system to fail to work normally
[0004] The above three schemes all need re-encryption in the end, but the timing of re-encryption is different, and there are problems that are not safe or cause the system to not work normally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher processor for avoiding reciphering and method for accessing data using same
  • Cipher processor for avoiding reciphering and method for accessing data using same
  • Cipher processor for avoiding reciphering and method for accessing data using same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] figure 1 It is a structural schematic diagram of a cryptographic processor of the present invention, which is composed of synchronous dynamic random access memory (SDRAM) and its control interface, Flash chip and its control interface, memory direct access DMA controller, built-in processor, peripheral equipment interconnection bus PCI controller and Data / control bus structure, synchronous dynamic random access memory SDRAM is connected with data / control bus electrical signal through SDRAM control interface, peripheral Flash is connected with data / control bus electrical signal through Flash control interface, memory directly accesses DMA controller, built-in processor, The peripheral device interconnection bus PCI controller is respectively connected with the data / control bus electric signal; the cryptographic processor is connected with the host computer through the PCI bus. Synchronous dynamic random access memory SDRAM control interface, Flash chip control interface,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Purpose of the invention is not to carry out encrypting again when user withdraws, avoids operation with large spending under cipher in order to raise system performance. The cipher processor is composed of SDRAM and control interface, Flash chip and control intrface, DMA controller, built-in processor, PCI bus controller. The method of the cipher processor for accessing data consists of key generation phase, storing data phase, and fetching data phase in sequence. In the invention, user's private key and key for file are only existed in the cipher processor in form of plain text, and are not exposed to any user. Thus, when user withdraws, it is unnecessary to regenerate key for file so as to avoid large spending on encrypting operation again. Raising security and performance, the invention is suitable to secure storage system involved in encrypting operation.

Description

technical field [0001] The invention belongs to the technical field of computer storage, and specifically relates to a method for accessing data using a cryptographic processor that avoids re-encryption, which is used to avoid re-encryption when the user cancels in an encrypted storage system, and is suitable for any cryptographic operation that does not want to be exposed A secure storage system for key information. Background technique [0002] With the rapid development of network technology and the frequent occurrence of security incidents, the security of storage systems has been widely concerned. Cryptography is an important means to ensure the security of storage systems, and a series of encrypted storage systems have also been born. [0003] In the encrypted storage system, when the user revokes, there is a problem of regenerating the file key to re-encrypt the file and re-issue the new key. The current encrypted storage system has three re-encryption schemes: (1) im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/02G06F21/62
Inventor 冯丹陈兰香张宇牛中盈庞丽萍许蔚
Owner HUAZHONG UNIV OF SCI & TECH